The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

JaeCheol Ha: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Permanent Fault Attack on the Parameters of RSA with CRT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:285-296 [Conf]
  2. Dong Jin Kwak, JaeCheol Ha, Hoon Jae Lee, Hwankoo Kim, Sang-Jae Moon
    A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:219-230 [Conf]
  3. JaeCheol Ha, Sang-Jae Moon
    Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:551-563 [Conf]
  4. ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim
    A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:549-554 [Conf]
  5. JaeCheol Ha, ChangKyun Kim, Sang-Jae Moon, IlHwan Park, HyungSo Yoo
    Differential Power Analysis on Block Cipher ARIA. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:541-548 [Conf]
  6. MahnKi Ahn, JaeCheol Ha, Hoon Jae Lee, Sang-Jae Moon
    A Random M-ary Method Based Countermeasure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:338-347 [Conf]
  7. ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon
    A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:150-158 [Conf]
  8. Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park
    New Key Management Systems for Multilevel Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:245-253 [Conf]
  9. Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha
    Improvement on Ha-Moon Randomized Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:154-167 [Conf]
  10. Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha
    Relative Doubling Attack Against Montgomery Ladder. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:117-128 [Conf]
  11. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Hardware Fault Attackon RSA with CRT Revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:374-388 [Conf]
  12. Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha
    Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:183-195 [Conf]
  13. HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park
    Side Channel Cryptanalysis on SEED. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:411-424 [Conf]
  14. JaeCheol Ha, Sang-Jae Moon
    A Common-Multiplicand Method to the Montgomery Algorithm for Speeding up Exponentiation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:66, n:2, pp:105-107 [Journal]
  15. JeaHoon Park, Hoon Jae Lee, JaeCheol Ha, Yongje Choi, Howon Kim, Sang-Jae Moon
    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:417-426 [Conf]
  16. JaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd
    LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. [Citation Graph (0, 0)][DBLP]
    ICUCT, 2006, pp:80-89 [Conf]

  17. A New Formal Proof Model for RFID Location Privacy. [Citation Graph (, )][DBLP]


  18. Low-Cost and Strong-Security RFID Authentication Protocol. [Citation Graph (, )][DBLP]


  19. HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. [Citation Graph (, )][DBLP]


  20. Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). [Citation Graph (, )][DBLP]


  21. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. [Citation Graph (, )][DBLP]


  22. A new fault cryptanalysis on montgomery ladder exponentiation algorithm. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002